Nadaf et al., 2016 - Google Patents
Cloud based privacy preserving secure health data storage and retrieval systemNadaf et al., 2016
- Document ID
- 11005557881197851509
- Author
- Nadaf S
- Patil R
- Publication year
- Publication venue
- 2016 International Conference on Inventive Computation Technologies (ICICT)
External Links
Snippet
Data sharing is an important functionality in cloud environment. The system proposes to build privacy into e-healthcare system with the help of private cloud. Privacy of the stored health data can be achieved by encrypting the data before storing it on cloud server. By …
- 238000000034 method 0 description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30091—File storage and access structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tong et al. | Cloud-assisted mobile-access of health data with privacy and auditability | |
Fabian et al. | Collaborative and secure sharing of healthcare data in multi-clouds | |
US9767299B2 (en) | Secure cloud data sharing | |
CN105378649A (en) | Multiple authority data security and access | |
WO2017061950A1 (en) | Data security system and method for operation thereof | |
CA3066701A1 (en) | Controlling access to data | |
CN106407681B (en) | Cloud system environment personal health record storage access method | |
CN115603934A (en) | Multi-user searchable encryption method and device based on block chain | |
Aruna et al. | Medical healthcare system with hybrid block based predictive models for quality preserving in medical images using machine learning techniques | |
JP6703706B2 (en) | Ciphertext management method, ciphertext management device and program | |
Qinlong et al. | Improving security and efciency for encrypted data sharing in online social networks | |
Nabeel et al. | Privacy-Preserving Fine-Grained Access Control in Public Clouds. | |
Ramesh et al. | Implementing One Time Password based security mechanism for securing personal health records in cloud | |
US9436849B2 (en) | Systems and methods for trading of text based data representation | |
Gowda et al. | Hierarchy attribute-based encryption with timing enabled privacy preserving keyword search mechanism for e-health clouds | |
Suthar et al. | EncryScation: A novel framework for cloud iaas, daas security using encryption and obfuscation techniques | |
ThandaiahPrabu et al. | An efficient and secured multiple keyword cloud data searching scheme with dynamic encryption procedure | |
Devassy | Research Project Questions | |
Dhivya et al. | Symptoms based treatment based on Personal Health Record using Cloud computing | |
Omotosho et al. | Securing private keys in electronic health records using session-based hierarchical key encryption | |
Sandeep et al. | Securable Personal Healthcare Record in Cloud Storage | |
Nadaf et al. | Cloud based privacy preserving secure health data storage and retrieval system | |
Mohandas et al. | Privacy preserving content disclosure for enabling sharing of electronic health records in cloud computing | |
Popa et al. | How to compute with data you can't see | |
George et al. | Privacy Protection and Con Dentiality in Medical IoT |